1
PublicDateAtUSN: 2017-03-24
2
Candidate: CVE-2016-10269
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269
6
https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
7
https://usn.ubuntu.com/usn/usn-3602-1
9
LibTIFF 4.0.7 allows remote attackers to cause a denial of service
10
(heap-based buffer over-read) or possibly have unspecified other impact via
11
a crafted TIFF image, related to "READ of size 512" and
12
libtiff/tif_unix.c:340:2.
15
mdeslaur> this will not be fixed in precise/esm
17
http://bugzilla.maptools.org/show_bug.cgi?id=2604
19
Discovered-by: Agostino Sarubbo
23
upstream: https://github.com/vadz/libtiff/commit/1044b43637fa7f70fb19b93593777b78bd20da86
24
upstream_tiff: released (4.0.7-2)
25
precise_tiff: ignored (reached end-of-life)
26
precise/esm_tiff: ignored
27
trusty_tiff: released (4.0.3-7ubuntu0.8)
28
vivid/stable-phone-overlay_tiff: ignored (reached end-of-life)
29
vivid/ubuntu-core_tiff: DNE
30
xenial_tiff: released (4.0.6-1ubuntu0.3)
31
yakkety_tiff: ignored (reached end-of-life)
32
zesty_tiff: not-affected (4.0.7-5)
33
artful_tiff: not-affected (4.0.7-5)
34
devel_tiff: not-affected (4.0.7-5)